1.Which definition of a fork in Linux is true?
A. daemon to execute scheduled commands
B. parent directory name of a file pathname
C. macros for manipulating CPU sets
D. new process created by a parent process
Answer: D

5.Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IPS phones?
A. replay
B. man-in-the-middle
C. dictionary
D. known-plaintext
Answer: B

6.Which definition of permissions in Linux is true?
A. rules that allow network traffic to go in and out
B. table maintenance program
C. written affidavit that you have to sign before using the system
D. attributes of ownership and control of an object
Answer: D

7.Which definition describes the main purpose of a Security Information and Event Management solution ?
A. a database that collects and categorizes indicators of compromise to evaluate and search for potential security threats
B. a monitoring interface that manages firewall access control lists for duplicate firewall filtering
C. a relay server or device that collects then forwards event logs to another log collection device
D. a security product that collects, normalizes, and correlates event log data to provide holistic views of the security posture
Answer: D